Research Article
Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec
Figure 7
Results of switching the policies of combined algorithms: (a) controlling program for switching; (b) policy switching records in the log file.
(a) |
(b) |